Chapter 1. Identifying security updates